SlideShare a Scribd company logo
   Port forwarding allows remote hosts from the Internet or outside network
    to connect to a server on the local network (inside network)
    ◦ The default firewall behaviour is to drop any connections starting from the
      outside
   Remote hosts typically use protocols such as http, https, ftp, ssh
   A remote host sends a request to the public global IP address of the inside
    server and the port number of the service required (usually the registered
    port no of the destination service e.g. port 80 for http)
    ◦ If the router is using PAT this is the outside interface address
       The wireless router uses PAT
    ◦ If the router is using static NAT this is mapped one-to-one address
   The request is routed to the outside interface of the router
   The router checks for a port forwarding rule that matches the protocol and
    the destination port of the request
    ◦ If a match to a rule exists the request is forwarded to the local IP address
      and the port number configured in the port forward rule
       Only one inside server can use the global IP/port number mapping
       E.g If there are 2 inside http servers one can use port 80 and one can use port 90
    ◦ If a match to a rule does not exist the request is dropped
   The remote host on the outside network must use the public
    global IP address to create the connection
   The port number used in the port forward rule is reserved for
    only 1 inside IP address
    ◦ A port number can’t be used to forward requests to a second server. To
      do this, select a different unused port no and create a second port
      forwarding rule
   Some applications; multimedia and torrents required several
    ports open for connections.
    ◦ Typically 1 or 2 ports are required for the control channels that setup
      and close the connection and monitor the connection.
    ◦ Extra ports may be required for the data stream, another for
      video, another for voice and another for chat
    ◦ Research the port nos required
    ◦ Use a port range in the forwarding rule
   A port trigger is used to open a port temporarily for a particular
    inside host only
    ◦ The port trigger allows new connections from the outside network to an
      inside host that initiated the data flow
    ◦ E.g. Port 25 is defined as a trigger and 113 as the port
    ◦ A local host checks mail and triggers port 25. The port trigger allows a
      back connection on port 113 (Identity information for mail) to the
      originating host
    ◦ The trigger times out and new connections to 113 are dropped
   The wireless router monitors outgoing traffic for the port numbers
    specified in the trigger
    ◦ When a match is made the IP address of the sending host (local address)
      is saved.
    ◦ When the return traffic arrives back at the router it is forwarded to the
      original sending host.
   Port triggers might be used in online gaming

More Related Content

PPTX
Port forwarding
PPTX
Firewall Design and Implementation
PPTX
Web essentials clients, servers and communication – the internet – basic inte...
PPT
Congetion Control.pptx
PDF
QOS (Quality of Services) - Computer Networks
PPTX
Security in distributed systems
PDF
Introduction to Parallel Computing
PPTX
Limitations of memory system performance
Port forwarding
Firewall Design and Implementation
Web essentials clients, servers and communication – the internet – basic inte...
Congetion Control.pptx
QOS (Quality of Services) - Computer Networks
Security in distributed systems
Introduction to Parallel Computing
Limitations of memory system performance

What's hot (20)

PDF
Raspberry Pi
PPTX
PPTX
Storage Virtualization
PPTX
6LoWPAN.pptx
PPTX
CCS335 – CLOUD COMPUTING.pptx
PPTX
Domain name system (dns)
PPTX
Multi processor scheduling
PPTX
Leaky bucket A
PPTX
Distributed computing
PPSX
Physical layer ppt
PPTX
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
PPTX
Unicast multicast & broadcast
PPTX
Transmission Control Protocol (TCP)
PPT
Proxy Servers
PPTX
Computer Network - Network Layer
PPTX
Tcp IP Model
PPTX
Ppt 3 - IOT logic design
PPTX
Quality of Service
PPTX
Task programming
PPTX
Synchronization in distributed computing
Raspberry Pi
Storage Virtualization
6LoWPAN.pptx
CCS335 – CLOUD COMPUTING.pptx
Domain name system (dns)
Multi processor scheduling
Leaky bucket A
Distributed computing
Physical layer ppt
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Unicast multicast & broadcast
Transmission Control Protocol (TCP)
Proxy Servers
Computer Network - Network Layer
Tcp IP Model
Ppt 3 - IOT logic design
Quality of Service
Task programming
Synchronization in distributed computing
Ad

Similar to Port forward (20)

PPTX
Nat
PDF
Network Programming Assignment Help
PDF
NAT on pfSense 2.3 - pfSense Hangout May 2016
PPTX
Network address translation
PPT
PPTX
Border Gatway Protocol
PDF
+ Network Programming.pdf
PPTX
Address Resolution Protocol Cache Poisoning
PPT
Ports & sockets
PPTX
Lecture 4-Internetworking-Concepts (view-only).pptx
PDF
NAT and firewall presentation - how setup a nice firewall
PPTX
IP Routing.pptx
PPTX
Firewall
PPT
network-security_for cybersecurity_experts
PPTX
IP Layer.pptx
PPTX
port forwarding.pptx
PDF
Networking.pdf
PPTX
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
PDF
Transport layer services
PPT
TCPIP in brief and working operation.ppt
Nat
Network Programming Assignment Help
NAT on pfSense 2.3 - pfSense Hangout May 2016
Network address translation
Border Gatway Protocol
+ Network Programming.pdf
Address Resolution Protocol Cache Poisoning
Ports & sockets
Lecture 4-Internetworking-Concepts (view-only).pptx
NAT and firewall presentation - how setup a nice firewall
IP Routing.pptx
Firewall
network-security_for cybersecurity_experts
IP Layer.pptx
port forwarding.pptx
Networking.pdf
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
Transport layer services
TCPIP in brief and working operation.ppt
Ad

More from lyndyv (15)

PPTX
Datarate
PPTX
Logging
PPTX
Policy
PPTX
Capacity
PPTX
Security standard
PPTX
Auth and association
PPTX
Dhcp
PPTX
Mac addressfilters
PPTX
Csmaca
PPTX
Basic config
PPTX
Service set
PPTX
Signals1
PPTX
Modulation
PPTX
IEEE WLAN standards
PPTX
Wireless components
Datarate
Logging
Policy
Capacity
Security standard
Auth and association
Dhcp
Mac addressfilters
Csmaca
Basic config
Service set
Signals1
Modulation
IEEE WLAN standards
Wireless components

Port forward

  • 1. Port forwarding allows remote hosts from the Internet or outside network to connect to a server on the local network (inside network) ◦ The default firewall behaviour is to drop any connections starting from the outside  Remote hosts typically use protocols such as http, https, ftp, ssh
  • 2. A remote host sends a request to the public global IP address of the inside server and the port number of the service required (usually the registered port no of the destination service e.g. port 80 for http) ◦ If the router is using PAT this is the outside interface address  The wireless router uses PAT ◦ If the router is using static NAT this is mapped one-to-one address  The request is routed to the outside interface of the router  The router checks for a port forwarding rule that matches the protocol and the destination port of the request ◦ If a match to a rule exists the request is forwarded to the local IP address and the port number configured in the port forward rule  Only one inside server can use the global IP/port number mapping  E.g If there are 2 inside http servers one can use port 80 and one can use port 90 ◦ If a match to a rule does not exist the request is dropped
  • 3. The remote host on the outside network must use the public global IP address to create the connection  The port number used in the port forward rule is reserved for only 1 inside IP address ◦ A port number can’t be used to forward requests to a second server. To do this, select a different unused port no and create a second port forwarding rule  Some applications; multimedia and torrents required several ports open for connections. ◦ Typically 1 or 2 ports are required for the control channels that setup and close the connection and monitor the connection. ◦ Extra ports may be required for the data stream, another for video, another for voice and another for chat ◦ Research the port nos required ◦ Use a port range in the forwarding rule
  • 4. A port trigger is used to open a port temporarily for a particular inside host only ◦ The port trigger allows new connections from the outside network to an inside host that initiated the data flow ◦ E.g. Port 25 is defined as a trigger and 113 as the port ◦ A local host checks mail and triggers port 25. The port trigger allows a back connection on port 113 (Identity information for mail) to the originating host ◦ The trigger times out and new connections to 113 are dropped  The wireless router monitors outgoing traffic for the port numbers specified in the trigger ◦ When a match is made the IP address of the sending host (local address) is saved. ◦ When the return traffic arrives back at the router it is forwarded to the original sending host.  Port triggers might be used in online gaming